Federico Maggi
Federico Maggi
Senior Researcher, Trend Micro Inc.
Verified email at trendmicro.com - Homepage
TitleCited byYear
Bitiodine: Extracting intelligence from the bitcoin network
M Spagnuolo, F Maggi, S Zanero
International Conference on Financial Cryptography and Data Security, 457-468, 2014
1812014
Detecting intrusions through system call sequence and argument analysis
F Maggi, M Matteucci, S Zanero
IEEE Transactions on Dependable and Secure Computing 7 (4), 381-395, 2008
1382008
Phoenix: DGA-based botnet tracking and intelligence
S Schiavoni, F Maggi, L Cavallaro, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2014
1282014
HelDroid: Dissecting and Detecting Mobile Ransomware
N Andronio, S Zanero, F Maggi
International Symposium on Recent Advances in Intrusion Detection, 382-404, 2015
1182015
ShieldFS: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
962016
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
852015
Protecting a moving target: Addressing web application concept drift
F Maggi, W Robertson, C Kruegel, G Vigna
Recent Advances in Intrusion Detection, 21-40, 2009
802009
A fast eavesdropping attack against touchscreens
F Maggi, A Volpatto, S Gasparini, G Boracchi, S Zanero
Information Assurance and Security (IAS), 2011 7th International Conference …, 2011
672011
AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors
F Maggi, A Valdi, S Zanero
Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in …, 2013
582013
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
572014
Effective anomaly detection with scarce training data
W Robertson, F Maggi, C Kruegel, G Vigna
Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2010
502010
Effective Anomaly Detection with Scarce Training Data
C Kruegel, F Maggi, G Vigna, W Robertson
Network and Distributed System Security Symposium (NDSS 2010), 1-16, 2010
50*2010
Reducing false positives in anomaly detectors through fuzzy alert aggregation
F Maggi, M Matteucci, S Zanero
Information Fusion 10 (4), 300-311, 2009
492009
Two years of short URLs internet measurement: security threats and countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
Proceedings of the 22nd international conference on World Wide Web (WWW'13 …, 2013
482013
An experimental security analysis of an industrial robot controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
2017 IEEE Symposium on Security and Privacy (SP), 268-286, 2017
442017
Lines of malicious code: insights into the malicious software industry
M Lindorfer, A Di Federico, F Maggi, PM Comparetti, S Zanero
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
422012
Selecting and improving system call models for anomaly detection
A Frossi, F Maggi, GL Rizzo, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2009
422009
BankSealer: A decision support system for online banking fraud analysis and investigation
M Carminati, R Caron, F Maggi, I Epifani, S Zanero
Computers & Security 53, 175-186, 2015
412015
Stranger danger: exploring the ecosystem of ad-based URL shortening services
N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ...
Proceedings of the 23rd international conference on World wide web, 51-62, 2014
412014
Finding non-trivial malware naming inconsistencies
F Maggi, A Bellini, G Salvaneschi, S Zanero
International Conference on Information Systems Security, 144-159, 2011
352011
The system can't perform the operation now. Try again later.
Articles 1–20